Cloud Technologies and Security

GhostWins

Katılımcı Üye
29 Şub 2020
538
575
Hello Friends, In this topic, I will talk about Cloud Technology and How We Can Provide Security.



What is cloud?

Cloud, also known as cloud, is a term that anyone interested in the industry has heard the least. In fact, Cloud is mostly preferred because it is used by companies and large companies, because it is inexpensive and physically takes up little space. The purpose of the cloud is that company IT managers or company owners can easily access their data from anywhere in the world. Companies using cloud technology are increasing exponentially day by day. However, there are companies that use the old physical server system. Just like everything has varieties, Cloud has varieties.


r3o8pf7.png



Cloud Types

smldo1f.png


eqsi8qj.png



SaaS

Issues such as the maintenance, management, and troubleshooting of all leased systems of the used or leased company are resolved by the company, especially companies that do not have a IT department, and their cost is higher than other packages.




nsxuh7w.png



PaaS

It enables users to run and manage tools such as software, servers, tools developed by the users and which are in beta stage, without any infrastructure server etc. It is among the most preferred packages.


taqa3tx.png




IaaS


It is perhaps the most used package by companies. In this package, there is a pay-as-you-go logic. Firms pay for the service they use or rent. In this type of systems, credit is found, and as a service is received, it is deducted from the credit system.




2lyeisn.png

can be diversified in this way





Areas where Cloud Technology is Most Used:


Servers

Databases

Special Software

Machine Codes (such as Artificial Intelligence)





Types of Cloud Computing


Public Cloud


All infrastructure and operations belong to the service provider, all account or server, package operations are done only through the account, no other access is in question, it is generally used by login service companies or self-developed users


2lkflf8.png


Community Cloud


In general, this package is preferred for server operations for governments, organizations or users, it is generally free, but if the package is upgraded, the paid version comes into play.



7h32ftf.png




Hybrid Cloud

It is generally used if continuous and active data is to be shared between two types of servers.




d8gliqq.png



Pirvate Cloud
In general, companies with an IT Department prefer companies, and operations such as management and updating are done from only one source, which is the IT department of the company or institution. The IT department performs all the operations itself.



luftekk.png



Securing Cloud Services





1-) Access

Especially in pirvate servers, this criterion should be very careful. If the wrong person is authorized, events such as data theft, confusion, hacking can occur.

2-) 2FA (Double Step Verification)

The IT Manager must put 2fa on the accessed cloud system, so that even if the attackers hack the account, it does not pose a serious problem since they cannot log in and losses are minimized.


3-) Vulnerability Check


The Company's Cyber Security Specialist or Penetration Testing Specialist must definitely perform a weekly penetration test, otherwise, there may be an opening in the system, data theft or a ransom demand.


4-) Social Engineering Trainings


In particular, authorized users should be trained to protect against social engineering, otherwise, no matter how adequate the other articles are, you are likely to suffer a loss.


5-) Security Solutions

Large-scale companies should especially attach great importance to this issue. By installing systems such as firewall ips, attacks can be prevented to a large extent, for example, even if there is an open in the system, even if the firewall sees an unauthorized access, it will prevent the attack and inform the iT Manager.






have a nice day

 
Son düzenleme:
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.